<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FW Outbound policy in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/584531#M3035</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;What is the best practice policy outbound from the FW itself (i.e management )?&lt;/P&gt;
&lt;P&gt;Allow any out? *.palotalto.com?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 20:24:19 GMT</pubDate>
    <dc:creator>chens</dc:creator>
    <dc:date>2024-04-22T20:24:19Z</dc:date>
    <item>
      <title>FW Outbound policy</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/584531#M3035</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;What is the best practice policy outbound from the FW itself (i.e management )?&lt;/P&gt;
&lt;P&gt;Allow any out? *.palotalto.com?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 20:24:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/584531#M3035</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2024-04-22T20:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: FW Outbound policy</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/584657#M3044</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It depends on what your needs would be and how locked down you want to be. For example if you use Stata Logging Service (Cortex Data Lake) There are things like&amp;nbsp;&lt;SPAN&gt;*.gpcloudservice.com and ocsp.godaddy.com&amp;nbsp;needed. Personally I would just recommend doing it by app-id, for the Palo services that are various app-ids for the services and the documentation should list it. For example, here is Strata Logging Services:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Claw4609_0-1713891749755.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59236i5118022929E25A68/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Claw4609_0-1713891749755.png" alt="Claw4609_0-1713891749755.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/strata-logging-service/administration/planning/ports-and-fqdns" target="_blank"&gt;TCP Ports and FQDNs Required for Strata Logging Service (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 17:02:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/584657#M3044</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-04-23T17:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: FW Outbound policy</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/586065#M3138</link>
      <description>&lt;P&gt;Create a custom URL list with all the palo FQDNs they recommend, make sure you have service route configured correctly if using anything other than Mgmt. Then use all the palo app-id selections with application default. Watch the logs over a few day for any URLs its trying to hit that might be palo related. Also use policy optimizer to slim down your app usage and rid of any apps your policy isn't using.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 18:43:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/586065#M3138</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-05-07T18:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: FW Outbound policy</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/586085#M3142</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Along with the above already mentioned, disable all content inspection and ssl decryption, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 20:45:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/fw-outbound-policy/m-p/586085#M3142</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-05-07T20:45:45Z</dc:date>
    </item>
  </channel>
</rss>

